نتایج جستجو برای: counterproductive behaviors
تعداد نتایج: 127801 فیلتر نتایج به سال:
The purpose of this research is to identify the elements that influence counterproductive based on variables communication skills and competence at Gatot Subroto Presidential Hospital. This a quantitative study. sample in study consisted 1580 voluntary employees, 1250 employees Soebroto Army Hospital, 330 YMU Pavilion, 1136 nursing staff. sampling technique used probability sampling, namely ran...
Most if not all vertebrates and probably some other Metazoa (animals as currently defined in science), are sentient. Sentience is the outcome of converting biological values into good (positive) or bad (negative) experience. The good or bad experiences (feelings) are generated in a vertebrate brain by dedicated structures in response to exposure to biologically beneficial or detrimental factors...
This article was acceptedfOr publication April 5, 1996 M any persons with brain damage refuse or avoid participating in a therapeutic program. This avoidance is a major obstacle to rehabilitation (Zencius, Lane, & Wesolowski, 1991) and may be due to cognitive impairments (e.g., decreased awareness of deficits, limited insight and judgment) (Alderman 1991). To avoid participation in therapy, the...
OBJECTIVE To better understand the issues and needs of adolescents with chronic health conditions, the Video Intervention/Prevention Assessment (VIA) integrates video technology with qualitative research methods to obtain a patient-centered perspective on illness and health care. METHODS Young people with chronic disease are interviewed for condition-specific verbal reports (CSVRs) of their m...
INTRODUCTION A growing body of applied research has identified certain psychological traits that are predictive of worker safety. However, most of these studies suffer from an overreliance on common method bias caused by self-report measures of both: (a) personal factors such as personality traits; and (b) outcomes such as safety behaviors and injuries. METHOD This study utilized archival dat...
The application of Cybersecurity in HPC has historically been considered as counterproductive to research in Open Science. NERSC proposes a systematic way of determining where Cybersecurity-significant data should be sampled as well as an overview of our analysis methodology. To demonstrate this we look at the Bro Intrusion Detection system as well as the instrumented SSHD currently in use.
Title of dissertation: BEHAVIORAL OUTCOMES OF INTERPERSONAL AGGRESSION AT WORK: A MEDIATED AND MODERATED MODEL Jana Lee Raver, Doctor of Philosophy, 2004 Dissertation directed by: Dr. Michele J. Gelfand Department of Psychology Interpersonal aggression at work is abundant, yet despite the importance of this topic for employees’ well being, systematic research on aggression in organizational set...
by the U.S. Department of Justice (2004) that one in three people will become victims of identity theft at some point in their lifetime. The bulk of the research into information security has gone into the investigation of technological aspects of security, and there are gaps in the literature relative to contravention of security measures. Drawing from deterrence theory and using the theory of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید